INTRODUCTION TO BASIC COMPUTER USAGE AND SECURITY
INTRODUCTION TO BASIC COMPUTER USAGE AND SECURITY
1. INTRODUCTION
Computer is fast becoming an essential commodity that individuals and organizations cannot do without. It is increasingly becoming relevant in virtually all activities we are engaged in and its knowledge is now given a lot of priority and prominence as a requirement for employment in most organizations. In short it is a way of life today. Understanding how to operate a computer and making it secure from intruders and fraudster is therefore a most for everybody who wants to be part of the dynamism of this modern time.
This paper is broadly divided into three sections. The first section is introduction while the second section takes us through basic procedures in computer operations. The last section presents an overview of computer security and how to improve same in our computers and networks.
2. BASIC COMPUTER USAGE
This section comprises the following:
(a) Naming the Parts of Your Computer
(b) Operating Systems
(c) Turning Your Computer On and Off
(d) Starting and Ending Programs
(e) Finding Programs and Files
(f) Saving Files
(g) Opening Files
(h) Deleting Files
(i) Installing Software
(j) Creating Shortcut on Your Desktop
(k) Trouble-shooting
(l) Word Processor Quick Start
(m) Windows keyboard shortcuts overview
(a) Naming the Parts of Your Computer
When you are sitting at the computer, you really do not need to know the names of all the parts to explain your frustration when something does not work the way you think it should. You can simply point and say, "That thing there started grinding, so I pressed this button, and now I can't find anything." Or, "I stuck one of these flat things in this hole, and now I can't get it out." However, when people start talking about computers at a social gathering or you need to set up a new computer, you better know your part names.
What is a PC?
PC stand for personal computer. Many people use the term "personal computer" to describe any computer that can stand on its own two feet.
The System Unit: Brains in a Box
Although the system unit doesn't look any more impressive than a big shoe box, it contains the following components that enable your computer to carry out the most complex operations:
❖ Memory Chips: Also called RAM (random-access memory). These chips electronically store program instructions and data, so your computer can grab the information in a hurry.
❖ Central Processing Unit (CPU), pronounced "sea-pea-you," is your computer's brain. If it's real smart, it's called a Pentium and it has MMX tacked to the end of it. (MMX doesn't stand for anything, but it gives the chip increased capabilities for playing multimedia.)
❖ Input and Output Ports Located at the back of the system unit are several outlets into which you can plug your keyboard, mouse, monitor, printer, modem, and other devices.
❖ Floppy Disk Drives: Appearing as slots on the front of the system unit, these devices read from and write to diskettes (those square plastic things you stick in the slots). Most new computers have only one floppy disk drive.
❖ Hard Disk Drives: A hard disk drive usually hides inside the system unit, so you can't see it or stick anything in it. The hard disk itself acts as a giant floppy disk, storing hundreds of times more information than any floppy disk can swallow.
❖ CD-ROM Drive Most new computers come with a CD-ROM drive that acts a lot like a CD player. This CD player, however, can play programs, games, video clips, sound, and music. New DVD (Digital Video Disc) players do the same thing, but they're faster and they hold truckloads of data.
❖ Other Goodies The system unit might also contain a modem (for connecting to other computers using the phone), a sound card (for playing audio), and other electronic gadgets.
Peripherals The system unit is the central part of the computer. Any devices that are attached to the system unit are considered peripherals. Peripheral devices include the monitor, printer, keyboard, mouse, modem, and joystick.
❖ The Monitor: That TV Thing The monitor is your computer's windshield. As you drive your computer, the monitor lets you see where you're going. It even collects about as much dirt as your car's windshield--everything from tiny bits of dust to globs of unidentifiable gunk.
You will run into all sorts of monitors, including the standard 15-inch variety and monitors that look like big-screen TVs. These big monitors are designed mostly for people who do page layout and require a screen that can show an entire page or two-page spread. They are also useful if you are pulling up pages on the Internet.
If you already started your computer, you may notice that the picture doesn't completely fill the screen, as it does on a TV set. Do not worry, your monitor is not defective. The picture size is typically adjusted by the manufacturer to make the picture as clear as possible. If you make the picture bigger, the edges of the picture can become a little blurry.
Speaking of picture quality, your monitor has several controls, typically located on the front or back of the monitor, which enable you to adjust the brightness, contrast, position, and size of the display. These controls might be tiny knobs, push buttons, or little dials that you need a screwdriver to turn, and they may be hidden behind a panel. (If you have the screwdriver dials, don't use a metal screwdriver: Get a special plastic screwdriver from you’re electronics store probably in your neighborhood.
Before you fiddle with the controls on the monitor itself, you should check the display settings in Windows. The cause of most display problems resides in a software issue, not in the monitor. If you need to adjust the monitor itself, make changes in small increments, especially if you are changing the position of the display on the screen: Otherwise, you might move the display right off the screen.
❖ The Keyboard (Yes, You Have to Type). The keyboard has so many keys. In addition to providing keys for typing text, numbers, and punctuation, a computer keyboard contains special function keys (labeled F1-F12), cursor-movement keys (the arrow keys, plus Home, End, Page Up, and Page Down), and a few other funky keys.
Now, you might think that all keyboards are created equal. The fact is that some keyboards are more equal than others. You'll find ergonomic keyboards whose shape follows the contours of your hands, keyboards that split in half enabling you to raise or lower each half separately, and keyboards with a built-in Windows shortcut key. You may even encounter infrared (wireless) keyboards, which connect to a special infrared port on the computer and transmit signals via light!
❖ The Mouse: A Rodent You Must Live With. The mouse, also called a "Mexican hairless," is a critter that sits next to the keyboard. You slide the mouse over your desktop or mouse pad to move a pointer around on the monitor. The buttons on the mouse let you select commands and other objects that appear on the monitor.
Like keyboards, mice come in several flavors. The plain-vanilla mouse has two buttons, but you'll see mice with three buttons or two buttons and a little wheel you can spin, and even mice that look like miniature keyboards. And, if you happen to be a lefty, you'll be happy to know that you can easily switch the functions of the left and right mouse buttons.
❖ Your Modem: Calling Other Computers. If you plan on being hip, your computer should have a modem, so you can connect to the Internet and go to places such as , send email messages to your friends and relatives, chat with complete strangers, and explore other ways to reduce your productivity at work.
The modem sits inside or outside the computer, and connects to your phone jack. (If you're not sure whether your computer has an internal modem, check the back of the system unit: If there's a phone jack, you have an internal modem.) It can dial numbers for you and connect to remote computers all over the world.
❖ The Printer: Getting It on Paper. The printer's job is to transform the electric burps and beeps in your computer into something that normal human-type people can read. Printers range from inexpensive dot-matrix types, which print each character as a series of dots, to laser printers, which operate like copy machines. In between are inkjet printers, which spray ink on the page (sounds messy, but it's not).
The Peripheral Grab Bag: Other Computer Accessories
Although the previous sections introduced the most common parts that make up a computer, many computer dealers offer additional toys that you might not be able to pass up. Here's a list of the most common add-on devices:
❖ Audio Rarely do you see an ad for a computer without a stereo sound card, speakers, and a microphone. If you want to listen to audio CDs, explore a multimedia encyclopedia, hear robots blow up in a video game, or listen to audio clips on the Internet; your computer needs a sound card. And if you want to record sounds or use your computer as an overpriced telephone, it had better be equipped with a microphone, as well. Although most microphones plug into the same sound card you use for your speakers, the microphone might clip onto your lapel, hang on your monitor, or sit on your desktop.
❖ Joystick If you plan on playing some video games, you'll need a joystick. Don't go cheap, because lousy joysticks provide little control for the latest games. Get a Microsoft SideWinder or comparable joystick.
❖ Scanner A scanner can copy text or images from paper copy and transfer the data to your computer so you can use it in your documents. Before you run out and buy a scanner, consider purchasing a combination printer, scanner, copy, fax machine. You can usually find one of these inexpensive combo machines relatively affordable, and you won't clutter your desk with individual units.
❖ Zip and Backup Drives A Zip or backup drive is a high-capacity drive that uses removable storage disks, cartridges, or tapes. This enables you to transfer data from one computer to another, take it on the road, or back up files from your hard disk.
❖ Digital Cameras One of the hottest new computer toys, the digital camera allows you to take photos or record video clips and then store and play them on your computer. Many of these cameras come with enough memory to store hundreds of snapshots or several minutes of full-motion video, and you don't have to take your film to Photo Studio to have it developed! In addition, because the photos are digitized, you can plop the pictures into letters, cards, and other documents you create.
❖ TV Converters Your monitor looks like a TV, so it may as well act like one, too. With a special display card that plugs in to your system unit, you can watch your favorite TV shows on your computer.
❖ Flash Disk An alternative to floppy disk. It can store hundreds of times more information than any floppy disk. It has different sizes and capacity: 16MB, 32MB, 64MB to even GBs.
(b) Operating Systems
An operating system is the program that manages all the application programs in a computer system. This also includes managing the input and output devices, and assigning system resources.
Operating systems evolved as the solution to the problems that were evident in early computer systems, and coincide with the changing computer systems. Three cycles are clear in the evolution of computers, the mainframe computers, minicomputers and microcomputers, and each of these stages influenced the development of operating systems.
Now, advances in software and hardware technologies have resulted in an increased demand for more sophisticated and powerful operating systems, with each new generation able to handle and perform more complex tasks.
In 1992, Microsoft for Workgroups 3.1 was introduced, extending on from the previous versions. It allowed the sending of electronic mail, and provided advanced networking capabilities to be used as a client on an existing local area network. This was only the one stage in the vast evolution of the worlds most popular operating system, which was followed by Windows NT and Windows 98, the latter being a fully Internet integrated operating system. Since then more advanced windows operating systems were developed (windows millennium, windows 2000, windows XP, windows server 2003) However, windows is not the only operating system in use today. Others such as UNIX, Apple Operating System, Linux and OS/Warp have also had an impact, each new version more advanced, and more user friendly then the last.
This presentation is however based on the windows operating system and particularly windows 98 to more modern versions.
(c) Turning Your Computer On and Off
On
Almost all computers are made with a power switch in the front. However, some older machines may have a switch on the back of the box. Normally, after you turn the computer on, it will "boot up" (or load the startup software and the operating system) and bring you to the computer’s desktop (a place where you can access the computer’s services).
Exceptions:
• If the computer wasn’t shut down properly, it will probably run a program to scan the hard drive for errors and try to fix them if found. (If the computer prompts you to fix a problem, allow it to do so and choose "Skip Undo" if it becomes an option.)
• If the computer prompts you to enter a password, do so if you know it and click "Ok". If there isn’t supposed to be a password, click "Ok" to go on (hopefully). If that doesn’t work, you will need to find out what the password is.
NOTE: If you click "Cancel", you will go on but you’ll lose most, if not all, of your network functions (possibly the internet).
Off
Although your computer may look like nothing more than a fancy TV, you can't just turn it off when you're finished working. Doing so could destroy data and foul up your programs. Here's the right way to turn off your computer:
Save any files you have open on a disk. When you have a file open, your work is stored in RAM, which is like brain cells that require electricity to work. If you turn off the electricity without saving your work on a disk, your computer forgets your work.
Quit any programs you are currently using. When you close a program, it makes sure you've saved all your work to disk, and then it shuts itself down properly. To exit most programs, you click the Close button (an X in the upper-right corner of the program's window), or you open the program's File menu and select Exit.
Click the Start button in the lower-left corner of the Windows screen and choose Shut Down. A dialog box appears asking whether you want to shut down the computer or reboot it.
Click Shut Down and then click the OK button.
Wait until Windows tells you that it is now safe to shut down your computer.
Put your floppy disks away. Floppy disks can become damaged if you leave them in the disk drives. First, make sure that the floppy drive light goes off. Then, remove the floppy disk from the disk drive and put it away.
Make sure the hard disk drive light is off, and then turn off the system unit.
Turn off the monitor and any other devices that are connected to the system unit. (On laptop computers and some newer desktop models, the system may shut down the monitor or place it in sleep mode automatically when you shut down Windows or turn off the system unit.)
(d) Starting and Ending Programs
Starting the Program
If you can’t find an icon on the desktop to double-click on, try these steps:
• Click on the "Start" button
• Click on "Programs"
• Click on the folder that contains the program. Look for a folder with a name similar to what you just installed.
• Click on the program name
• From here, just run the program as per its instructions
You can create a shortcut on the desktop or even in the program listing (the desktop is the most common place).
Ending the Program
Make sure you save your work (if necessary). Click on "File" then "Exit" (or "Quit"). That’s the standard way. Now for a few exceptions:
There are the occasional programs that will exit if you hit the escape key (Esc).
Windows users can click on the "X" box in the far upper right-hand corner of the program window to exit.
Shortcuts
Holding "Alt" while pressing "F4" is the same as "File" and "Exit".
Memory Trap!!! If you minimize a program, the program is still running and is still using RAM (Random Access Memory). Make sure you exit/quit programs when you’re done.
(e) Finding Programs and Files
Possibly the hardest thing to do on a computer is to keep the files you create, load, or save organized. You work hard on something and then can’t open it up to work on it, or print it, because it’s not in the folder you expect it to be.
Navigating through folders works if you have an idea of where you are going. Sometimes you just need a little help finding files. Windows has a "find" type of program which works in the same manner: type the name of the file, (if the "find" program finds the file) double-click on it to activate it.
Windows: Click on "Start", then "Find", then "Files or Folders". Type the file name and click on "Find Now". Or use ‘search’ in other advanced windows versions.
(f) Saving Files
When you start working on a file, save it on the hard drive right away and then continue to save your work every 10-15 minutes. To save a file, click on "File" and "Save". If it is the first time to save the file, you will see a window which will let you choose which folder to save in and what file name to choose. Then click on "Save" to complete the process. As you continue to work, click on "File" and "Save". This will update you work.
If you want to save the file into another folder, click on "File" and "Save As". This will open a window and allow you to save to a different folder or even another computer.
(g) Opening Files
Opening up a file is similar to saving files. After you start the program, click on "File" and "Open". A dialogue box appears that will let you find the folder and then the file you need. Click "Open" to see your saved work. Another way to open a file is to double-click on the file from within your hard drive.
From the desktop, double-click on "My Computer", then double-click on your hard drive (probably drive C or D), then keep double-clicking on the appropriate folders until you find your file (i.e. "My Computer" > "Drive C" > "My Documents" > Sampletest.doc"). By double-clicking on the file, you’ll automatically start the program that created it.
(h) Deleting Files
You cannot do this from within a program. You must be at the desktop to delete files. Deleting files is almost identical to opening files except for the last step.
From the desktop, double-click on "My Computer", then double-click on your hard drive (probably drive C or D), then keep double-clicking on the appropriate folders until you find your file (i.e. "My Computer" > "Drive C" > "My Documents" > "Sampletest.doc"). Then click on "File" and "Delete" then "Yes" or click and drag the file to the recycle bin or right-click on the file and then click on "Delete" and "Yes" (shortcut).
Remember to empty the trash (or recycle bin). The files won’t be permanently deleted until you do so.
(i) Installing Software
There are 3 ways to install and use software:
• You don’t install--just run the program from the CD (rare)
• You install the software and never need the disks or CD to run the program
• You install a portion of the program and need the CD in the machine to use the program
You often don’t know which type it is … you just have to put the CD in the machine and find out what kind of program it is.
(Note: Many CD’s are being made with an "Auto Run" feature. This means that when you put the CD into the machine, it’s automatically detected and begins to run the program. If you haven’t installed the program, you should be prompted to do so. If you’ve installed the program before, the program will either start automatically or prompt you to press a key to continue to the program.)
Method #1. You don’t install ... just run the program from the CD
-Open CD tray
-Insert CD label side up and close tray
From here, just run the program as per its instructions
• Double-click on the "My Computer" icon on the desktop.
• Double-click on the CD icon that appears in the My Computer window.
• If there isn’t an installer or setup icon in the window that appears then double-click on the icon that starts the program.
• From here, just run the program as per its instructions
Method #2. You install the software and never need the disks or CD to run the program
FLOPPY DISKS ARE USUALLY THIS WAY!!
For Windows, follow the same instructions for method #1 all the way up to starting the program. This time you’re looking for and double-clicking on an icon that’s labeled "Start Here", "Installer", "Setup", or something like that.
Follow the installer’s instructions. You usually just accept all of the defaults that the installer gives you. This means you may be clicking on "Next" or "Ok" or "Install" a lot of times.
Once the installer is done, you may have to restart the machine … go ahead and let the machine restart. Remove the disk or CD.
To run the program,
• Click on the "Start" button
• Click on "Programs"
• Click on the folder that created for your program. Look for a folder with a name similar to what you just installed.
• Click on the program name
• From here, just run the program as per its instructions
Method #3. You install a portion of the program and need the CD in the machine to use the program
This method is identical to Method #2. The only difference is that in order to run the program, you have to have the CD in the machine. If you don’t, you’ll receive an error message saying something like "Please insert CD into drive".
What happens with method #3 is that you are installing just the program but you still need the CD in the machine to access all the data the program uses.
(j) Creating Shortcut on Your Desktop
A shortcut is an icon that, if clicked on, will start a program or file that is located somewhere else on your hard drive or even on another computer on the network. This type of icon on your desktop (or folder on your desktop) is advantageous because if you or somebody else throws it into the trash (or recycle bin) then your program is still intact … only the shortcut was eliminated.
Here’s how to create a shortcut on your desktop:
From the desktop, double-click on "My Computer", then double-click on your hard drive (probably drive C or D), then keep double-clicking on the appropriate folders until you find the file you want to create the shortcut of (i.e. "My Computer" > "Drive C" > "Windows" > "Pbrush"). Single-click on the file. Click on "File", then "Create Shortcut". (Or right-click on the file and click on "Create Shortcut".) Click and drag the icon onto your desktop.
That’s it. Close your windows and double-click on the shortcut to start the file.
(k) Trouble-shooting
(Figuring out what’s wrong and maybe even fixing it yourself.)
If you can perform some basic troubleshooting before you look for technical expert, then 1 of 2 things may happen: 1) you fix it yourself, or 2) you’ll help the technicians be better prepared when they come to help you.
Here are some general tips/concepts for trouble-shooting problems with your computer:
Restart the computer - This clears the memory and usually reloads the settings (preferences) you normally start with. Be sure to save your work (if you can) before you restart.
Often a better method than restarting is to shut down completely, wait 10-15 seconds,
and then start the computer back up again.
Plug it in - Almost all of us have called a tech person in only to find the keyboard (or whatever) came unplugged. Sometimes you can solve a problem by unplugging equipment and carefully plugging it back in. (Many machines need to be turned off before you plug and unplug equipment.)
Uninstalling recently installed software or driver - Did you just installed a piece of software (or a driver)? If you did, and the problem occurred right after, you should try uninstalling the software and restarting the machine to see if it is the new software that is the problem. There usually is an "Uninstall" program that came with your software. Use that program to uninstall. If there isn’t that option, you’ll need to delete the folder that was installed by the software. There may be other files installed into the system, but these steps will help either fix the problem or give a tech person extra information to solve the problem.
If it’s software or the system, try to find out what happens immediately before the problem occurs. Does the problem happen over and over? If you can take note of what happens before the problem, then the tech person will have a better idea of the actual problem. If an error message appears, be sure to write it down. (Sometimes error messages aren’t enough to trouble-shoot. You have to have a better idea of the whole picture to solve many problems.)
Exchange the bad parts with good parts (turn off the computer if needed) -
A problem: A device attached to my computer (mouse, keyboard, printer) doesn’t work.
- Is the part broken and needing to be replaced?
- Is the connection in the computer to the device shorting out?
- Is the driver (a software program) that controls the device corrupt and needing to be replaced?
There is no way you’re going to know the answers to these questions until you do some basic steps: Restart the machine and check to make sure it’s plugged in. If it still doesn’t work, borrow an identical device from another computer (a neighbor perhaps), plug it in the same spot and restart the computer. If it works, your device is bad - get a new one or get it repaired. If exchanging didn’t work, call a tech person because either the system software or the connection needs to be repaired.
Get the idea? By replacing parts, you can isolate (and sometimes fix) the problem.
If the Computer Freezes …
Do NOT just walk away mumbling something about the computer’s questionable parentage. Restart the machine somehow and let it run the disk scanning program. Here’s how:
First try holding down the "Ctrl" and the "Alt" keys while pressing the "Del" key. If you don’t get an option to end the task that’s stalling the computer, then perform this sequence a couple of times to restart. If that doesn’t work, turn the power off, wait 10-12 seconds and turn the power back on. There should also be a restart button somewhere on the machine that reboots the computer.
Laptop users: Try removing the battery to completely turn the computer off
Your computer will freeze sometimes. This is an unfortunate fact. To avoid losing work, you need to get into the habit of saving your work every 5-10 minutes.
(l) Word Processor Quick Start
Word Processors are typing programs that allow you to type text, insert pictures, format the way the document looks, and make changes without having to retype entire pages. There are basic word processing programs that come with every operating system: Example "Word Pad" in Windows. These simple processors will handle the basic features covered in this quick start guide. However, more advanced programs like "MS Word" has more sophisticated graphics and formatting features.
The first thing to keep in mind is, "A word processor is a word processor is a word processor". They are all basically the same in any operating system and any program.
You start the program.
You type what you want.
You click on "File" and "Print" to print a hardcopy.
You click on "File" and "Exit" (or "Quit") when you’re done.
(Basically simple, but all the little extras that each program provides tend to complicate the situation.)
Getting Started
• Start your word processor program.
• Type a sentence or two. (Notice that as you type the blinking line (or cursor) moves with you. Where ever that line is, that’s where words or pictures will be placed. To move the cursor, use the arrow keys on your keyboard or click on the spot with your mouse where you want the cursor to be.)
• Change the font (the way letters are shaped). You can pick your choice in the list under "Font" and then click "OK" to make the change in your highlighted text. Your can also change the size of the fonts to whatever size you want.
• Change the style (bold, italics, underline, etc.). You can pick your choice in the list under "Font style" and then click "OK" to make the change in your highlighted text.
• Change the alignment. (Should the text be center, lined up on the left side, right side, or both left and right (full)?) . Click "Ok" to make your text move.
Shortcuts: In the Tool bar you should find buttons to click on to do all of the things discussed above. However, some programs either don’t display toolbars, or someone may have changed what you see in the toolbar? That’s why it’s best to learn using the Menu bar.
Finishing Up
Normally you would save work right after you start and then save again every 10 minutes or so, but this lesson is mostly practice so you may not want to save this work.
❖ If you want to save this activity, click on "File" and "Save As", make sure the folder is correct, type a file name, and click "Ok" or "Save".
❖ If you want to print, click "File", "Print", and then "Ok" to print.
❖ To leave the program, click "File", then "Quit" or "Exit". If you have been saving the work, click "Save" or "Yes" if it asks you. If you haven’t been saving the work, click "Don’t save" or "No" if it asks you.
(m) Windows keyboard shortcuts overview
Use shortcut keys as an alternative to the mouse when working in Windows. You can open, close, and navigate the Start menu, desktop, menus, dialog boxes, and Web pages using keyboard shortcuts. Keyboard shortcuts may also make it easier for you to interact with your computer.
Click a heading, or press TAB to highlight a heading, and then press ENTER.
|Press |To |
|CTRL+C |Copy. |
|CTRL+X |Cut. |
|CTRL+V |Paste. |
|CTRL+Z |Undo. |
|DELETE |Delete. |
|SHIFT+DELETE |Delete selected item permanently without placing the item in the Recycle Bin. |
|CTRL while dragging an item |Copy selected item. |
|CTRL+SHIFT while dragging an item |Create shortcut to selected item. |
|F2 |Rename selected item. |
|CTRL+RIGHT ARROW |Move the insertion point to the beginning of the next word. |
|CTRL+LEFT ARROW |Move the insertion point to the beginning of the previous word. |
|CTRL+DOWN ARROW |Move the insertion point to the beginning of the next paragraph. |
|CTRL+UP ARROW |Move the insertion point to the beginning of the previous paragraph. |
|CTRL+SHIFT with any of the arrow keys |Highlight a block of text. |
|SHIFT with any of the arrow keys |Select more than one item in a window or on the desktop, or select text within|
| |a document. |
|CTRL+A |Select all. |
|F3 |Search for a file or folder. |
|ALT+ENTER |View properties for the selected item. |
|ALT+F4 |Close the active item, or quit the active program. |
|ALT+Enter |Displays the properties of the selected object. |
|ALT+SPACEBAR |Opens the shortcut menu for the active window. |
|CTRL+F4 |Close the active document in programs that allow you to have multiple |
| |documents open simultaneously. |
|ALT+TAB |Switch between open items. |
|ALT+ESC |Cycle through items in the order they were opened. |
|F6 |Cycle through screen elements in a window or on the desktop. |
|F4 |Display the Address bar list in My Computer or Windows Explorer. |
|SHIFT+F10 |Display the shortcut menu for the selected item. |
|ALT+SPACEBAR |Display the System menu for the active window. |
|CTRL+ESC |Display the Start menu. |
|ALT+Underlined letter in a menu name |Display the corresponding menu. |
|Underlined letter in a command name on an open |Carry out the corresponding command. |
|menu | |
|F10 |Activate the menu bar in the active program. |
|RIGHT ARROW |Open the next menu to the right, or open a submenu. |
|LEFT ARROW |Open the next menu to the left, or close a submenu. |
|F5 |Refresh the active window. |
|BACKSPACE |View the folder one level up in My Computer or Windows Explorer. |
|ESC |Cancel the current task. |
|SHIFT when you insert a CD into the CD-ROM drive |Prevent the CD from automatically playing. |
3. COMPUTER SECURITY
Security is an important part of computer systems because it keeps unauthorized people from gaining access to the system and from tampering with other users' files. Security can also allow some users exclusive privileges to which commands they can use and which files they can access. For protection, some system administrators only permit the users access to certain commands or files.
PASSWORDS
Passwords add a level of security to your computer. When sharing a computer with others, your customized settings, computer programs, and system resources are more secure when you assign a password to your logon name or user account name. You must associate a password with your user account to secure it from unauthorized access.
Password Guidelines
You should have a unique password. Passwords should not be shared. Protect passwords as any other company asset. When creating passwords, make sure they are difficult to guess, but not so difficult that you have to write them down to remember them.
Using obscure passwords keeps your user ID secure. Passwords based on personal information, such as your name or birthday, are poor passwords. Even common words can be easily guessed.
Good passwords have at least six characters and include nonalphabetic characters. Strange word combinations and words purposely misspelled are also good. If your password is so hard to remember that you have to write it down, it is not a good password.
Use the following guidelines when selecting a password:
❖ Do not write passwords down. However, if you must write them down, place them in a physically secure place, such as a locked cabinet.
❖ Do not use your user ID as a password. Do not use it reversed, doubled, or otherwise modified.
❖ Do not reuse passwords. The system might be set up to deny the reuse of passwords.
❖ Do not use any person's name as your password.
❖ Do not use words that can be found in the online spelling-check dictionary as your password.
❖ Do not use passwords shorter than six characters.
❖ Do not use obscene words; they are some of the first ones checked when guessing passwords.
❖ Do use passwords that are easy to remember, so you won't have to write them down.
❖ Do use passwords that use both letters and numbers and that have both lowercase and uppercase letters.
❖ Do use two words, separated by a number, as a password.
❖ Do use pronounceable passwords. They are easier to remember
To create a user password
1. Open User Accounts in Control Panel.
2. Click your account name.
3. Click Create a password.
4. In Type a new password and Type the new password again to confirm, type the password for your account.
You can also enter descriptive or meaningful text in Type a word or phrase to use as a password hint to help you remember your password.
Notes
• When you create a password hint, anyone who uses the computer will be able to see the hint on the Welcome screen.
• A user with a computer administrator account can create and change passwords for all users on the computer. Users with limited accounts can only create and change their own passwords, as well as create their own password hints.
OTHER SOURCES OF SECURITY PROBLEM
It is of utmost importance to secure your system from intruders on your computer that is either standalone or in a network. There are a lot of areas you can be attacked, important information stolen or your computer gets corrupted with and becomes inaccessible. The following are some of the areas you can become vulnerable:
• Cracking;
• input manipulation;
• file alteration;
• data leakage;
• program alteration;
• e-mail forgery and threats;
• hacking;
• masquerading or impersonation;
• password cracking;
• scavenging;
• Trojan horse;
• virus; and
• Worm etc.
The following measures can help you improve security of your computer or network:
• Restrict access to computer equipment and data files.
• Encrypt data and programs.
• Protect the system from viruses.
• Control sensitive data.
• Control laptop computers.
• Monitor hacker information.
• Store backup copies of programs and data files in a secure, off-site location.
In the world of internet and networking, unauthorized access is usually gained by a "hacker" masquerading as an authorized user by means of sophisticated packages which are able to break passwords and match login names. Entry to an organisation’s network may also be gained via "trap doors" which are usually left by system programmers and which can bypass all of the security measures built into the program.
It is estimated that approximately over 10,000 malicious software applications are circulating in cyberspace, which may include, amongst others, Trojan horses, logic bombs, and applications known as Devil Dialers, Satan, Brute and Nutcracker.
To minimize these some prevention strategies may include:
• A regular risk assessment on the vulnerabilities of the network
• The installation of a "firewall", which restricts unauthorized access from the Internet. Firewall software and hardware applications are readily available in the market. There are also a number of applications available to the forensic specialist which would function undetected from the internal and external auditors, and which store deleted files, monitor system administrators and are watchdogs to the organisation’s electronic dealings.
As with the growth of malicious software applications, a number of applications have been designed for use by computer specialists. Traditionally, computer programmers designed packages like Norton Utilities which retrieves undeleted files, views hidden files, indicates time and date of access to data etc. The level of sophistication has been enhanced, and new products on the market are:
• "PC Investigator", which incorporates all the Norton Utilities functions, and links hidden files common to one another.
• "Little Brother is Watching You", features include log-in tracing, and location activation for Web-site monitoring and networks (i.e. sites visited, duration and user).
[pic]
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- introduction to basic computer usage and security
- color computer disk basic
- using your harvard computer society
- technology curriculum
- book assistant professor of computer science
- basic computer operations
- microsoft word vocabulary for computers 1
- review worksheet for basic computers test
- kanwal rekhi school of information technology iit bombay
Related searches
- how to find computer username and password
- dod introduction to information security answers
- introduction to information security cdse
- introduction to information security stepp
- introduction to information security usalearning
- introduction to basic computer pdf
- basic introduction to computer programming
- basic computer components and functions
- introduction to information security dod answers
- introduction to information security courses
- basic computer terms and definitions
- basic computer operations and functions